|Publication number||US7092912 B2|
|Application number||US 10/643,309|
|Publication date||15 Aug 2006|
|Filing date||19 Aug 2003|
|Priority date||8 Aug 2000|
|Also published as||US6658394, US7020634, US20040034605, US20040034606, US20050065812|
|Publication number||10643309, 643309, US 7092912 B2, US 7092912B2, US-B2-7092912, US7092912 B2, US7092912B2|
|Inventors||Ahmed Khaishgi, John Quinn|
|Original Assignee||Squaretrade, Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (27), Non-Patent Citations (70), Referenced by (14), Classifications (25), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application is a continuation patent application and claims priority from U.S. patent application Ser. No. 09/634,149, filed Aug. 8, 2000 now U.S. Pat. No. 6,658,394, the entire content of which is incorporated herein by reference.
The present invention relates to electronic seals.
One of the difficulties a user faces when engaging other parties online, such as joining online clubs, purchasing items or generally interacting with others, is that the user typically has limited contact with the other parties and, therefore, often has privacy concerns and other legitimate apprehensions. This is especially true when the user wishes to conduct business online, such as in an online marketplace or business-to-business intermediary. As a result, some organizations have established “seal programs” by setting policies and issuing electronic “seals” to companies that adhere to the policies. For example, TRUSTe™ is an independent, non-profit privacy organization that has developed a third-party oversight seal program that tries to alleviates users' concerns about online privacy, TRUSTe issues an electronic seal image to organizations that meet its privacy program. The certified organizations display the seal on their websites to indicate their compliance with the program.
In general, the invention provides techniques for issuing electronic seals such that non-certified parties cannot easily steal or otherwise misuse the seals. According to one aspect of the invention, a central seal “issuer” verifies the credentials, policies or business practices of online merchants and issues a corresponding seal of certification upon verification. Unlike conventional systems, the seal issuer can generate a unique seal for each merchant. The seal issuer generates the seal in the form of a media object that includes an encrypted watermark containing an expiration date. A central seal server stores the media objects such that the merchants can dynamically retrieve and display the electronic seals as needed. The seal issuer, therefore, can easily revoke or update the seals on the central seal server.
In another aspect, the invention is directed to a method in which a database is accessed to retrieve certification data for a set of online merchants and a corresponding media object is generated for each merchant as a function of the certification data. Each media object represents a seal of certification for the corresponding online merchant. In one configuration, the media objects are generated by an embedding an encrypted digital watermark having an expiration date for the seal. The media objects are stored on a seal server such that each media object can be retrieved according to a unique identifier for the corresponding merchant. Upon receiving such a request, the requested media object is communicated to a client device for presentment to a user.
In yet another aspect, the invention is directed to a computer-readable medium having instructions configured to cause a programmable-processor to perform the methods described herein.
The invention offers several advantages over conventional systems. For example, because the media objects are centrally stored by the seal issuer, and can be unique to each online merchant, each seal can easily be revoked or updated. Furthermore, requests to display the seals can more easily be tracked such that general usage can be reported and misuse can be detected.
Various embodiments of the invention are set forth in the accompanying drawings and the description below. Other features and advantages of the invention will become apparent from the description, the drawings, and the claims.
User 6 uses computing device 10 to remotely interact with merchants 4 over network 12. Computing device 10 represents any communication device suitable for interfacing with network 12 and interacting with merchants 4 such as a personal computer running a web browser such as Internet Explorer™ from Microsoft Corporation of Redmond, Wash. Alternatively, computing device 4 can be, for example, a personal digital assistant (PDA), such as a Palm™ organizer from Palm Inc. of Santa Clara, Calif., or a network-enabled cellular telephone.
Seal issuer 8 verifies the credentials, policies or business practices of each Merchant 4 and issues a corresponding seal of certification to each merchant 4 upon verification. In order to become a “seal holder”, each merchant 4 must comply with requirements set by seal issuer 8. For example, seal issuer might, for example, verify that merchant 4 is a legitimate business merchant that complies with, or agrees to conform to, certain standards. For example, seal issuer 8 may be an online dispute resolution service that is designed to help buyers and sellers settle issues involving online transactions, such as issues that may arise in an online auction. In this instance, seal issuer 8 issues an electronic seal to merchants 4 that agree to participate in the web-based problem solving service. As another example, seal issuer 8 can be an organization that verifies merchants 4 compliance with privacy or security requirements. Alternatively, for example, seal issuer 8 may perform a nominal amount of certification before issuing the seal such as verifying the contact information.
Upon verifying a merchant 4, seal issuer 8 issues the merchant 4 an electronic seal that is a recognizable symbol associated with certain qualities such as trustworthiness, reliability, and superior customer service. Merchants 4 post their corresponding electronic seals on their web sites or in electronic mail messages (emails) in order to increase the confidence of potential customers. Unlike conventional techniques, seal issuer 8 does not issue a static image to merchants 4. As described in detail below, seal issuer 8 generates and maintains a unique electronic seal for each merchant 4. As such, seal issuer 8 can instantly issue, update, change, or revoke a seal when a merchant 4 fails to comply with the requirements. In addition, seal issuer 8 tracks the use of all issued electronic seals in order to detect any misuse or theft of the seal.
Web servers 20 provide an interface for communicating with computing device 10 via network 12. Web servers 20 execute web server software, such as Internet Information Server™ from Microsoft Corporation, of Redmond, Wash., and provide an environment for interacting with users 6 and merchants 4, such as when merchants 4 apply for seals or when users 6 request more information about a certified merchant 4. Web servers 20 serve web pages and communicate the web pages over network 12. The web pages may include static media such as text and graphic imagery, as well as conventional input media such as text entry boxes, radio buttons, drop-down menus, and the like.
Seal servers 22 provide access to seal repository 25, which stores a set of media objects that represent the electronic seals. Each media object contains media, such as image data, video data, and audio data, that merchant 4 presents as an electronic seal of certification. Each media object corresponds to one of the merchants 4 and can be retrieved from seal repository 25 based on a unique identifier for the corresponding merchant. In one configuration, each media object is given a unique file name and stored within a file system provided by seal server 22 such that computing device 10 can directly retrieve the media object without requiring that seal issuer 8 access a database. In addition to the media, such as the image data, each media object contains a watermark having encrypted information such as an expiration date, a time stamp and the unique identifier for the corresponding merchant 4.
Database 23 stores information for each merchant 4 such as current certification status, contact information and an expiration date for each merchant's unique seal. Request log 24 stores all requests for the media objects and the merchant information.
Admin server 26 provides administrative functionality for seal issuer 8 and provides an operating environment for a number of software modules including seal maintenance modules 27 and theft detection modules 28. Seal maintenance modules 27 are responsible for generating a unique media object when a new merchant 4 is certified and updating the media object if the merchant loses its certified status. In addition, seal maintenance modules 27 periodically regenerate the media objects, including updating the embedded expiration date and the timestamp.
Upon certifying a merchant 4, seal maintenance modules 27 generate a corresponding media object and issue code for use by the merchant to uniquely reference the media object. For example, a merchant 4 having a unique identifier of 1520511267 can use the following code to reference a media object housed within seal servers 22:
Theft detection modules 28 analyze request log 24 in order to detect any misuse or theft of an electronic seal. For example, when a seal is requested, seal servers 22 record the internet protocol (IP) address of the requesting merchant within request log 24. In addition, when user 6 clicks on the seal to verify the seal, web servers 20, provide the information to the user and log the IP address of computing device 10. Theft detection modules 28 analyze request log 24 to detect any new or unexpected IP addresses. Upon detecting misuse, seal maintenance modules 27 issue a new seal to the affected merchant 4 by generating a new media object, storing the media object within seal repository 25, and instructing the merchant to update its website software to point to the new seal.
Theft detection modules 28 also use spidering technology to search network 12 for all occurrences of issued seals. Upon finding a seal, theft detection modules 28 decrypt the embedded watermark, determine whether the seal has expired, inform any interested parties of the expiration and optionally revoke the expired seal.
In one configuration, web servers 20 filters the information based on one or more stored settings, such as an anonymity parameter, which causes web servers 20 to filter contact information for the merchant 4. In another configuration, web servers 20 monitor the requesting universal resource locator (URL) for merchant 4 and filter the information accordingly. In this manner, seal issuer 4 can filter contact information when the seal is used by online intermediaries that prevent buyers from directly contacting sellers.
Various embodiments have been described for issuing electronic seals of certification to online entities, such as online merchants. These and other embodiments are within the scope of the following claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5495412||15 Jul 1994||27 Feb 1996||Ican Systems, Inc.||Computer-based method and apparatus for interactive computer-assisted negotiations|
|US5538290 *||12 May 1994||23 Jul 1996||Formtronics, Inc.||Method and apparatus for inhibiting the copying of checks and negotiable documents|
|US5668953||22 Feb 1995||16 Sep 1997||Sloo; Marshall Allan||Method and apparatus for handling a complaint|
|US5884944 *||29 May 1997||23 Mar 1999||Durham; Mark P.||Systems and methods for recognizing and rewarding individual contributions|
|US5893117||22 Jun 1993||6 Apr 1999||Texas Instruments Incorporated||Time-stamped database transaction and version management system|
|US5893905||24 Dec 1996||13 Apr 1999||Mci Communications Corporation||Automated SLA performance analysis monitor with impact alerts on downstream jobs|
|US5895450||14 Jul 1997||20 Apr 1999||Sloo; Marshall A.||Method and apparatus for handling complaints|
|US5956687||4 Apr 1997||21 Sep 1999||Wamsley; Vaughn A.||Personal injury claim management system|
|US5970475||10 Oct 1997||19 Oct 1999||Intelisys Electronic Commerce, Llc||Electronic procurement system and method for trading partners|
|US6237096||4 May 1998||22 May 2001||Eoriginal Inc.||System and method for electronic transmission storage and retrieval of authenticated documents|
|US6330551||6 Aug 1998||11 Dec 2001||Cybersettle.Com, Inc.||Computerized dispute resolution system and method|
|US6347332||7 Mar 2000||12 Feb 2002||Edwin I. Malet||System for network-based debates|
|US6363384||29 Jun 1999||26 Mar 2002||Wandel & Goltermann Technologies, Inc.||Expert system process flow|
|US6389151||18 Nov 1999||14 May 2002||Digimarc Corporation||Printing and validation of self validating security documents|
|US6442687||2 Dec 1999||27 Aug 2002||Ponoi Corp.||System and method for secure and anonymous communications|
|US6470448 *||31 Mar 1997||22 Oct 2002||Fujitsu Limited||Apparatus and method for proving transaction between users in network environment|
|US6766307||11 May 2000||20 Jul 2004||Clicknsettle.Com, Inc.||System and method for providing complete non-judicial dispute resolution management and operation|
|US20010007106||15 Feb 2001||5 Jul 2001||Slaikeu Karl A.||System for the analysis of organizational conflicts|
|US20020007362||28 Apr 2000||17 Jan 2002||Thoughtbridge||Apparatus and Method for Facilitating Agreement Over a Network|
|US20020038293||13 Jul 2001||28 Mar 2002||Seiden Henry A.||Web-enabled method and system for managing remote dispute resolution|
|US20030028762||8 Feb 2002||6 Feb 2003||Kevin Trilli||Entity authentication in a shared hosting computer network environment|
|US20030188194||29 Mar 2002||2 Oct 2003||David Currie||Method and apparatus for real-time security verification of on-line services|
|US20040210527||21 Apr 2003||21 Oct 2004||Woda Steven L.||Safe transaction guaranty|
|US20050044009||30 Sep 2004||24 Feb 2005||Lucinda Stone||Method for using computers to facilitate and control the creating of a plurality of functions|
|EP0689824A1||21 Jun 1995||3 Jan 1996||Roberto Calliari||Method for sealing containers and for ensuring their correct allocation to a preset user, and device for performing the method|
|JP2003114927A||Title not available|
|JPH02284261A *||Title not available|
|1||"ADR Resources," Center for Information Technology and Dispute Resolution, http://www.ombuds.org/center/articles1.|
|2||"Code of Online Business Practices," Council of Better Business Bureau, Inc., 2003, http://www.bbbonline.org/reliability/code/code.asp.|
|3||"Disputes in cyberspace 2001," Update for Online Disputes Resolution for Consumers in Cross-Border Disputes, Office for Developed and Transition Economics, Consumers International, Nov. 2001.|
|4||"Out-of-Court Dispute Settlement Systems for E-Commerce," The Report form the workshop held in Brussels, European Commission Report.|
|5||"Proceedings of a Conference on Electronic Dispute Resolution," National Center for Automated Information Research (NCAIR), May 22, 1996, Washington D.C.|
|6||Bordone, Robert C., "175 Electronic Online Dispute Resolution: A Systems Approach-Potential, Problems, and a Proposal," Harvard Negotiation Law Review, pp. 175-211, 1998, http://cyber.law.harvard.edu/property00/jurisdiction/bordoneedit.html.|
|7||Chua, Lusan, "Ebay: Conflict Management in an Online Community," 2002, http://www.ombuds.org/cyberweek2003/chua.paper.htm.|
|8||Declaration of Ethan Katsh Under 37 C.F.R. 1.132.|
|9||Devack, Melissa, "Intellectual Property As An Investment: A Look At How ADR Relates to the European Union's Proposal for Electronic Commerce in the Single Market," 2002, http://www.cardozo.yu.edu/cojcr/final<SUB>-</SUB>site/articles<SUB>-</SUB>notes/vol2<SUB>-</SUB>an/Devack.htm.|
|10||Elangovan, "Managerial third-party dispute intervention: A prescriptive model of strategy selection," Academy of Management Review, vol. 20, No. 4, pp. 800-830 (Oct. 1995).|
|11||Explanation of 'contact' and 'marketplace' printed from http://www.dictionary.com.|
|12||Geist, Michael, "Fair.com?: An Examination of the Allegations of Systemic Unfairness in the ICANN UDRP," University of Ottawa, Aug. 2001, http://aix1.uottawa.ca/~geist/geistudrp.pdf.|
|13||Gilbert, Pamela, "On Space, Sex and Stalkers," http://www.echonyc.com/~women/Issue17/art-gilbert.html.|
|14||http://www.arb-forum.com-National Arbitration Forum.|
|15||http://www.arbiter.wipo.int/arbitration/-WIPO Arbitration and Mediation Center.|
|16||http://www.bbbonline.com-BBBonline (A Better Business Bureau Program).|
|27||http://www.resolution.org-Resolution Forum, Inc.|
|30||http://www.verisign.com-VeriSign Internet Trust Services.|
|33||Information on Bell Atlantic, 1998, 1999.|
|34||Information on Neural Tech, Inc., 1996-1998.|
|35||International Search Report from corresponding PCT Application Serial No. PCT/US04/14726, mailed Jun. 1, 2005 (3 pages).|
|36||Johnson, David R., "Dispute Resolution in Cyberspace," http://www.eff.org/Legal/Arbitration/online<SUB>-</SUB>dispute<SUB>-</SUB>resolution<SUB>-</SUB>johnson.article, Feb. 1994.|
|37||Katsh, Ethan et al., E-Commerce, E-Disputes, and E-Disputes Resolution: In the Shadow of "eBay Law", Ohio State Journal on Dispute Resolution, vol. 15:3, pp. 705-734, 2000.|
|38||Katsh, Ethan M., "Dispute Resolution in Cyberspace," Conn. L. Rev., 1996, http://www.umass.edu/legal/articles/uconn.html.|
|39||*||Liddy, Carrie, "Commercial Security on the Internet", Internet Research v6n2/3, 1996, pp. 75-78, ISSN: 1066-2243.|
|40||Manevy, Isabelle, "Online Dispute Resolution: what future?" Jun. 2001, http://www.ombuds.org/cyberweek2002/manevy<SUB>-</SUB>odr01.pdf.|
|41||Mudd Jr., Charles Lee, "Cybercourt: A Virtual Resolution of Differences," 1995, http://www.mudd.org/professional/articlesclm/cybercourt.htm.|
|42||Non-Profit Dating Service retrieved from the Internet Archive Wayback Machine of data Feb. 19, 1999, (4 pages).|
|43||Nyhart, "Computer Modeling in Dispute Resolution: An Overview," Dispute Resolution Forum, Apr. 1988, p. 3, 11-15.|
|44||Rabinovich-Einy, Orna, "The Ford-Firestones of the Future: Resolving Offline Disputes in an Online Society," http://www.ombuds.org/cyberweek2003/rabinovich<SUB>-</SUB>einy.htm.|
|45||Schneider, Michael E. et al., "Dispute Resolution in International Electronic Commerce," http://www.disputes.net/cyberweek2001/interElecCommerce.htm.|
|46||SchWeber, Claudine, "The Use of Technology in Conflict Resolution," 1995, http://www.batnet.com/oikoumene/arbtadr.html.|
|47||Thiessen, Ernest et al., "Beyond Win-Win in Cyberspace," Ohio State J. of Dispute Resolution, 2000, 15(3), 643, http://www.smartsettle.com/more/beyond/BeyondWinWin.html.|
|48||U.S. Appl. No. 09/504,159, filed Feb. 15, 2000, entitled "Electronic Dispute Resolution System," by Khaishgi, Ahmed et al.|
|49||U.S. Appl. No. 10/634,654, filed Aug. 5, 2003, entitled "System and Method for Resolving a Dispute in Electronic Commerce and Managing an Online Dispute Resolution Process," by Khaishgi, Ahmed et al.|
|50||U.S. Appl. No. 10/672,136, filed Sep. 26, 2003, entitled "Automated Online Dispute Resolution," by Khaishgi, Ahmed et al.|
|51||Unisys to market Neural Tech CADRE software as part of its credit card dispute processing solution set, Oct. 22, 1998.|
|52||Written Opinion from corresponding PCT Application Serial No. PCT/US04/14726, mailed Jun. 1, 2005 (3 pages).|
|53||www.bizrate.com, 2 pages (last printed Apr. 5, 2005).|
|54||www.buysafe.com, 1 page (last printed Apr. 5, 2005).|
|55||www.cnet.com, 4 pages (last printed Apr. 5, 2005).|
|56||www.comodogroup.com, 2 pages (last printed Apr. 5, 2005).|
|57||www.epinions.com, 2 pages (last printed Apr. 5, 2005).|
|58||www.epubliceye.com, 1 page (last printed Apr. 5, 2005).|
|59||www.geotrust.com, 1 page (last printed Apr. 5, 2005).|
|60||www.gomez.com, 1 page (last printed Apr. 5, 2005).|
|61||www.guardianecommerce.net, 2 pages (last printed Apr. 5, 2005).|
|62||www.hackersafe.com, 1 page (last printed Apr. 5, 2005).|
|63||www.nabp.net, Verified Internet Pharmacy Practice Sites (VIPPS(TM)), A Program of the National Association of Boards of Pharmacy, 2 pages (last printed Apr. 5, 2005).|
|64||www.nextag.com, 1 page (last printed Apr. 5, 2005).|
|65||www.pricegrabber.com, 2 pages (last printed Apr. 5, 2005).|
|66||www.scanalert.com, 1 page (last printed Apr. 5, 2005).|
|67||www.shopping.com, 2 pages (last printed Apr. 5, 2005).|
|68||www.truste.com retrieved from the Internet Archive Wayback Machine, (63 pages).|
|69||www.visa.com, 1 page (last printed Apr. 5, 2005).|
|70||www.webtrust.org/abtseals.htm, 9 pages (last printed Apr. 5, 2005).|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7343339||3 May 2001||11 Mar 2008||Shelton E. Harrison, Jr.||Electronic bond and guaranty process and business method|
|US7853515||28 Mar 2007||14 Dec 2010||Shelton E. Harrison, Jr.||Electronic bond and guaranty process and business method|
|US8533581 *||13 May 2010||10 Sep 2013||Symantec Corporation||Optimizing security seals on web pages|
|US8595145||22 Nov 2010||26 Nov 2013||Shelton E. Harrison, Jr.||Electronic bond and guaranty process and business method|
|US8635535||15 Apr 2010||21 Jan 2014||D&B Business Information Solutions Limited||Third-party-secured zones on web pages|
|US8635536||13 Oct 2011||21 Jan 2014||D&B Business Information Solutions Limited||Third-party-secured zones on web pages|
|US8683201||16 Oct 2007||25 Mar 2014||D&B Business Information Solutions Limited||Third-party-secured zones on web pages|
|US9712532||3 Jun 2013||18 Jul 2017||Symantec Corporation||Optimizing security seals on web pages|
|US20010039524 *||3 May 2001||8 Nov 2001||Harrison Shelton E.||Electronic bond & guaranty process and business method|
|US20070168218 *||28 Mar 2007||19 Jul 2007||Shelton Harrison||Electronic bond and guaranty process and business method|
|US20090100505 *||16 Oct 2007||16 Apr 2009||Trusted Partners, Inc.||Third-party-secured zones on web pages|
|US20100251144 *||15 Apr 2010||30 Sep 2010||Shachar Shaty||Third-party-secured zones on web pages|
|US20110066523 *||22 Nov 2010||17 Mar 2011||Shelton E. Harrison, Jr.||Electronic bond and guaranty process and business method|
|US20110283174 *||13 May 2010||17 Nov 2011||Verisign, Inc.||Optimizing Security Seals on Web Pages|
|U.S. Classification||705/58, 705/62|
|International Classification||G06Q30/00, G06Q50/18, G06Q20/40, G06Q10/10, G06Q20/38, G06Q30/06, G06Q99/00|
|Cooperative Classification||G06Q20/3821, G06Q30/06, G06Q20/4016, G06Q50/182, G06Q20/401, G06Q10/10, G06Q30/0601, G06Q30/018|
|European Classification||G06Q30/06, G06Q10/10, G06Q30/018, G06Q20/3821, G06Q20/401, G06Q20/4016, G06Q50/182, G06Q30/0601|
|26 Jan 2010||FPAY||Fee payment|
Year of fee payment: 4
|28 Mar 2014||REMI||Maintenance fee reminder mailed|
|14 Aug 2014||FPAY||Fee payment|
Year of fee payment: 8
|14 Aug 2014||SULP||Surcharge for late payment|
Year of fee payment: 7